Wind River Support Network

Meet the Support Network

Home CVE Database CVE-2010-3749

CVE-2010-3749

Description

The browser-plugin implementation in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1 does not properly handle an unspecified character within arguments to the RecordClip method, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a crafted method call, related to a parameter injection issue.

Priority: High
CVSS v3: 0.0
Component: WRLinux doesn't ship realnetworks realplayer.WRLinux doesn't ship realnetworks realplayer_sp.
Publish Date: Oct 18, 2010
Related ID: --
CVSS v2: 9.3
Modified Date: Oct 19, 2010

Find out more about CVE-2010-3749 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Not Vulnerable -- -- --
Wind River Linux 8 Not Vulnerable -- -- --
Wind River Linux 9 Not Vulnerable -- -- --
Wind River Linux 7 Not Vulnerable -- -- --
Wind River Linux LTS 21 Not Vulnerable -- -- --
Wind River Linux LTS 18 Not Vulnerable -- -- --
Wind River Linux LTS 19 Not Vulnerable -- -- --
Wind River Linux CD release Not Vulnerable -- -- --
VxWorks
VxWorks 7 Not Vulnerable -- -- --
VxWorks 6.9 Not Vulnerable -- -- --

Related Products

Product Name Status Defect Fixed Downloads

Notes
Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.
Live chat
Online